نتایج جستجو برای: spam mails

تعداد نتایج: 5032  

Journal: :CoRR 2009
M. Tariq Banday Tariq R. Jan

Spam is not only clogging the Internet traffic by consuming a hefty amount of network bandwidth but it is also a source for e-mail born viruses, spyware, adware and Trojan Horses. It is also used to carry out denial of service, directory harvesting and phishing attacks that directly cause financial losses. Further, the contents of spam are often offensive and contain adult oriented and fraudule...

2012
Raheleh Kholghi Soheil Behnam Roudsari

Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server...

Journal: :JSW 2013
Changda Wang Tingting Gong Patricia Ghann

In order to cope with the problem of spam soaring, a personalized e-mail filtering method based on UCON is proposed. E-mails from different senders were classified as junk e-mail, suspicious e-mail and normal email by trust third-party according to the maintained blacklist and embedded machine learning technology online. Suspicious e-mails will be classified further from users’ point of view ma...

2008
G. Richard A. Doncescu

One of the most irrelevant side effects of e-commerce technology is the development of spamming as an e-marketing technique. Spam e-mails (or unsolicited commercial e-mails) induce a burden for everybody having an electronic mailbox: detecting and filtering spam is then a challenging task and a lot of approaches have been developed to identify spam before it is posted in the end user’s mailbox....

2007
Giorgio Fumera Ignazio Pillai Fabio Roli Battista Biggio

In this paper we focus on the so-called image spam, which consists in embedding the spam message into images attached to e-mails to circumvent statistical techniques based on the analysis of body text of e-mails (like the “bayesian filters”), and in applying content obscuring techniques to such images to make them unreadable by standard OCR systems without compromising human readability. We arg...

Journal: :African J. of Inf. & Commun. Technology 2008
Olumide B. Longe Stella C. Chiemeke Olufade F. W. Onifade Folake Adunni Longe

The inefficiencies of current spam filters against fraudulent (419) mails is not unrelated to the use by spammers of good-word attacks, topic drifts, parasitic spamming, wrong categorization and recategorization of electronic mails by e-mail clients and of course the fuzzy factors of greed and gullibility on the part of the recipients who responds to fraudulent spam mail offers. In this paper, ...

2013
Robin Sharma

Spam detection or filtering process is required to cope with the harmfull effect of spam e-mails affecting directly or indirectly to the users. SPAM e-mails have a direct cost in terms of time, server storage space, network bandwidth consumptions and indirect costs to protect privacy and security breaches [6]. For providing solution to solve this problem various techniques has been implemented....

2016

Spam is an Unsolicited Commercial Email(UCE). It involves sending messages by email to numerous recipients at the same time (Mass Emailing). Spam mails are used for spreading virus or malicious code, for fraud in banking, for phishing, and for advertising. So it can cause serious problem for internet users such as loading traffic on the network, wasting searching time of user and energy of the ...

2008
Sihem Belabbes Gilles Richard

As a side effect of e-marketing strategy the number of spam e-mails is rocketing, the time and cost needed to deal with spam as well. Spam filtering is one of the most difficult tasks among diverse kinds of text categorization, sad consequence of spammers dynamic efforts to escape filtering. In this paper, we investigate the use of Kolmogorov complexity theory as a backbone for spam filtering, ...

2008
Christoph Pörschmann Heiko Knospe

Mit modernen Telekommunikationssystemen lassen sich aufgezeichnete Sprachnachrichten einer großen Zahl von Telefonteilnehmern automatisiert zustellen. Speziell in IPbasierten Netzen sind Aufwand und Kosten für solche (in der Regel unerwünschten) SPAM-Anrufe gering. IPbasierter Telefonie-SPAM, der in der Regel als SPIT bezeichnet wird, kann in absehbarer Zukunft ein ernst zu nehmendes Problem da...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید